Show plain JSON{"affected_release": [{"advisory": "RHSA-2012:0529", "cpe": "cpe:/a:redhat:enterprise_mrg:2::el5", "package": "condor-0:7.6.5-0.14.el5", "product_name": "MRG for RHEL-5 v. 2", "release_date": "2012-04-30T00:00:00Z"}, {"advisory": "RHSA-2012:0529", "cpe": "cpe:/a:redhat:enterprise_mrg:2::el5", "package": "python-qpid-0:0.14-6.el5", "product_name": "MRG for RHEL-5 v. 2", "release_date": "2012-04-30T00:00:00Z"}, {"advisory": "RHSA-2012:0529", "cpe": "cpe:/a:redhat:enterprise_mrg:2::el5", "package": "qpid-cpp-mrg-0:0.14-14.el5", "product_name": "MRG for RHEL-5 v. 2", "release_date": "2012-04-30T00:00:00Z"}, {"advisory": "RHSA-2012:0529", "cpe": "cpe:/a:redhat:enterprise_mrg:2::el5", "package": "qpid-java-0:0.14-3.el5", "product_name": "MRG for RHEL-5 v. 2", "release_date": "2012-04-30T00:00:00Z"}, {"advisory": "RHSA-2012:0529", "cpe": "cpe:/a:redhat:enterprise_mrg:2::el5", "package": "qpid-jca-0:0.14-9.el5", "product_name": "MRG for RHEL-5 v. 2", "release_date": "2012-04-30T00:00:00Z"}, {"advisory": "RHSA-2012:0529", "cpe": "cpe:/a:redhat:enterprise_mrg:2::el5", "package": "qpid-qmf-0:0.14-9.el5", "product_name": "MRG for RHEL-5 v. 2", "release_date": "2012-04-30T00:00:00Z"}, {"advisory": "RHSA-2012:0529", "cpe": "cpe:/a:redhat:enterprise_mrg:2::el5", "package": "qpid-tests-0:0.14-1.el5", "product_name": "MRG for RHEL-5 v. 2", "release_date": "2012-04-30T00:00:00Z"}, {"advisory": "RHSA-2012:0529", "cpe": "cpe:/a:redhat:enterprise_mrg:2::el5", "package": "qpid-tools-0:0.14-2.el5", "product_name": "MRG for RHEL-5 v. 2", "release_date": "2012-04-30T00:00:00Z"}, {"advisory": "RHSA-2012:0529", "cpe": "cpe:/a:redhat:enterprise_mrg:2::el5", "package": "sesame-0:1.0-3.el5", "product_name": "MRG for RHEL-5 v. 2", "release_date": "2012-04-30T00:00:00Z"}, {"advisory": "RHSA-2012:0528", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "condor-0:7.6.5-0.14.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2012-04-30T00:00:00Z"}, {"advisory": "RHSA-2012:0528", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "qpid-cpp-0:0.14-14.el6_2", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2012-04-30T00:00:00Z"}, {"advisory": "RHSA-2012:0528", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "qpid-java-0:0.14-3.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2012-04-30T00:00:00Z"}, {"advisory": "RHSA-2012:0528", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "qpid-jca-0:0.14-9.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2012-04-30T00:00:00Z"}, {"advisory": "RHSA-2012:0528", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "qpid-qmf-0:0.14-7.el6_2", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2012-04-30T00:00:00Z"}, {"advisory": "RHSA-2012:0528", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "sesame-0:1.0-5.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2012-04-30T00:00:00Z"}], "bugzilla": {"description": "qpid-cpp: cluster authentication ignores cluster-* settings", "id": "747078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747078"}, "csaw": false, "cvss": {"cvss_base_score": "5.8", "cvss_scoring_vector": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "status": "verified"}, "details": ["Apache Qpid 0.12 does not properly verify credentials during the joining of a cluster, which allows remote attackers to obtain access to the messaging functionality and job functionality of a cluster by leveraging knowledge of a cluster-username."], "name": "CVE-2011-3620", "package_state": [{"cpe": "cpe:/o:redhat:enterprise_linux:6", "fix_state": "Not affected", "package_name": "mingw32-qpid-cpp", "product_name": "Red Hat Enterprise Linux 6"}, {"cpe": "cpe:/o:redhat:enterprise_linux:6", "fix_state": "Not affected", "package_name": "qpid-cpp", "product_name": "Red Hat Enterprise Linux 6"}, {"cpe": "cpe:/a:redhat:enterprise_mrg:1", "fix_state": "Will not fix", "package_name": "qpid-cpp", "product_name": "Red Hat Enterprise MRG 1"}], "public_date": "2012-04-30T00:00:00Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2011-3620\nhttps://nvd.nist.gov/vuln/detail/CVE-2011-3620"], "statement": "This flaw only affects the clustered implementation in qpid-cpp (qpidd-cpp-server-cluster) which is only available in Red Hat Enterprise MRG. The qpid-cpp-server as provided with Red Hat Enterprise Linux 6 does not include this functionality, and is thus not affected.", "threat_severity": "Moderate"}